article thumbnail

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates

CGI

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates. Some utilities even provide vehicle-to-grid services and home energy management systems to help consumers manage their electricity usage. Tue, 02/19/2019 - 10:45. In Europe, if one owns solar panels but not a battery, E.ON

article thumbnail

US indicted 4 Russian government employees for attacks on critical infrastructure

Security Affairs

has indicted four Russian government employees for their role in cyberattacks targeting hundreds of companies and organizations in the energy sector worldwide between 2012 and 2018. According to the indictment, the campaigns against the energy sector campaign involved two phases. and international Energy Sector organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

billion IoT devices in use as of 2017, half are consumer gadgets, like smart TVs, speakers, watches, baby cams and home thermostats; much of the rest is made up of things like smart electric meters and security cameras in corporate and government use. This will be led by the manufacturing, consumer, transportation and utilities sectors.

IoT 189
article thumbnail

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

And hackers linked to the Russian government were reportedly behind the Triton hack of 2017 , as well, as disclosed by security vendor FireEye. Issued a few days after the killing, the report assesses cyber risks of North American electrical utilities, identifying 11 hacking groups that target energy sector companies.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

According to statistics from the FBI’s 2021 Internet Crime Report , complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. According to the 2021 IBM Threat Force Intelligence Index , Manufacturing was the industry most likely to be attacked last year, comprising 23.2% billion in reported losses.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Draft Regulations will remain open for comment through August 10, 2017. This post has been updated. .

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. Significantly, version 1.1 NIST’s fact sheet on the updated version is available here: [link].